Identify.Innovate.Implement
Remote Support Management Services + PIM/PAM
Overview
Agenda
• Who are we? • Why RSM• Lyra RSM services• Benefits • Partners• Remote Support• PIM• PAM• Case Studies
1©2019 LYRA INFOSYSTEMS.ALL RIGHTS RESERVED WORLDWIDE
Who are we - Lyra Infosystems
Lyra Infosystems is the leading multinational professional services and consulting company incorporated in 2007, headquartered in Bangalore predominantly serving in the ASEAN region providing state-of-the-art services to world class organizations for more than a decade.
Other offices in Mumbai, Gurgaon and Singapore.
Extensive expertise in the domains of Software Composition Analysis, Open Source Security, OS Compliance, OS Audits, Opensource Vulnerability Assessment, Open Source Support, Legal re-mediation, DevOps/DevSecOps, Remote Support, Open Source Monitoring, Privilege Identity & Access Management, Open Source ERP/CRM & Cybersecurity.
We ensure organizations of varied capacities leverage innovative, integrated solutions that are flexible at the same time cost-effective.
2©2019 LYRA INFOSYSTEMS.ALL RIGHTS RESERVED WORLDWIDE
Why Remote Support Management?
• Efficient troubleshooting and solving your IT issues faster • Securely access and fix any problem remotely • Create queues, have teams in place and set policies to perform desktop & mobile device support
for your internal employees no matter where they are located• Workload on your IT support is increasing• Lower IT support costs• Streamlining Remote support to improve customer experiences• Scalable Remote IT support • Increase profitability and productivity by eliminating access issues and delays• Defend against cyber threats• Improper security strategies & policies in place• Failing to adhere to compliance regulations
3©2019 LYRA INFOSYSTEMS.ALL RIGHTS RESERVED WORLDWIDE
4
Remote Support Management Challenges
A Decentralized Environment
©2019 LYRA INFOSYSTEMS.ALL RIGHTS RESERVED WORLDWIDE
5
Lyra's Remote Support Management Services
Lyra's RSM services offers you the security, integration, and management capabilities your IT and customer support organizations need to increase productivity, improve performance and deliver a superior customer experience.
Our RSM solutions provide organizations with extensive capabilities beyond just simple screen sharing and control.
Lyra RSM lets you support all of your systems over the web, even if they are behind firewalls you actually don’t control. With only one solution, your users can chat, collaborate, remote control, screenshare, set up jump clients, support mobile devices & unattended systems.
©2019 LYRA INFOSYSTEMS.ALL RIGHTS RESERVED WORLDWIDE
6
Lyra's RSM Solutions
24/7 support & consultancy services
Centralized solutions for integration with identity mgmt systems
Choose solutions either on-premise or on Cloud
Holistic training programs on new product releases
Integrated cross-services for continuous optimizationPremium level end-to-end
customer support via a dedicated team
Assess,troubleshoot & resolve incidents faster
©2019 LYRA INFOSYSTEMS.ALL RIGHTS RESERVED WORLDWIDE
7
How do we do it?
©2019 LYRA INFOSYSTEMS.ALL RIGHTS RESERVED WORLDWIDE
8
What you get from Lyra RSM• Flexible Support portal page• Next-gen remote solutions• Seamless processes• Intelligent integration• User friendly solutions• Dedicated customer support and consultancy services
©2019 LYRA INFOSYSTEMS.ALL RIGHTS RESERVED WORLDWIDE
9
Lyra's RSM Partner
Lyra Infosystems, is the exclusive Bomgar partner in India & ASEAN regions.
We understand that the corporate world cannot just rely on encryption for secure remote support.
©2019 LYRA INFOSYSTEMS.ALL RIGHTS RESERVED WORLDWIDE
About BeyondTrustThe fastest, most secure way for experts to access and support the systems that need them.
• Trusted by more than 13,000 Companies
• 15 year history of innovation• 280+ Employees across US, EMEA, &
APAC• Leader in secure remote support and
access management
©2019 LYRA INFOSYSTEMS.ALL RIGHTS RESERVED WORLDWIDE 10
11©2019 LYRA INFOSYSTEMS.ALL RIGHTS RESERVED WORLDWIDE
Remote Support Features
• Provide fast Remote assistance to any desktop, server or mobile devices with screen sharing and remote control anywhere
• Manage unattended access to thousands of systems and grow your business securely
• Set granular, role-based permissions for your team users
• Record, log and monitor session activity for a complete audit trail
• Easily export data for an audit or in-depth monitoring
• Centralized Management
• Maintain corporate branding standards and create trust for your customers
12
Increased Efficiency and Productivity…
CONSOLIDATION SERVICE LEVELS INTEGRATION
• Support Multiple Platforms
• Support Mobile Devices
• On or Off Network
• Avoid cost and maintenance of multiple tools
• Includes chat-based and remote camera sharing support
• Easy Session Initiation
• Mobile and web-based support
• Increased First Call Resolution
• Collaboration and Escalation
• Ease of use and reliability increase CSAT
• Streamline processes for better efficiency
• ITSM/CRM System
• Security Providers
• Knowledge Management Systems
©2019 LYRA INFOSYSTEMS.ALL RIGHTS RESERVED WORLDWIDE
13©2019 LYRA INFOSYSTEMS.ALL RIGHTS RESERVED WORLDWIDE
ON-PREMISESDMZ
©2019 LYRA INFOSYSTEMS. ALL RIGHTS RESERVED WORLDWIDE14
SECURE CLOUD
©2019 LYRA INFOSYSTEMS. ALL RIGHTS RESERVED WORLDWIDE15
16
Remote Support Comparison
©2019 LYRA INFOSYSTEMS.ALL RIGHTS RESERVED WORLDWIDE
17
Secure Access Solutions
SECURE & DEFEND
Credentials and Passwords
ACCESS & PROTECT
Remote systems and infrastructure
SUPPORT & SERVICE
People and devices
©2019 LYRA INFOSYSTEMS.ALL RIGHTS RESERVED WORLDWIDE
18
Secure Access for...
PRIVILEGED INSIDERS THIRD-PARTY VENDORS AUDIT AND COMPLIANCE
Give administrators the access to the systems they need without harming productivity.
Grant contractors and vendors privileged access to critical assets without giving them a VPN.
Set granular permissions and record activity for privileged accounts to ease audit and compliance.
©2019 LYRA INFOSYSTEMS.ALL RIGHTS RESERVED WORLDWIDE
19
BeyondTrust Privileged Access Management Solution
The fastest way to protect your most critical assets from cyber threats.
PRIVILEGED ACCESS
Manage and monitor privileged access to
critical systems… without the need of
VPN.
PRIVILEGED IDENTITY
Continuous, automated account discovery protects privileged credentials at scale.
©2019 LYRA INFOSYSTEMS.ALL RIGHTS RESERVED WORLDWIDE
Risks of Unmanaged Privileged Credentials?
• No comprehensive, up-to-date list of the privileged logins that exist on your network
• No verifiable record of which privileged login credentials are know to different individuals
• No Proof of who has used these privileged logins to gain access to any of your resources, when, and why?
• No way to verify that each of your privileged account passwords are cryptographically strong and unique
• No complete list of privileged account passwords stored within your applications and no way to know which in-house and vendor personnel have knowledge of these credentials
©2019 LYRA INFOSYSTEMS.ALL RIGHTS RESERVED WORLDWIDE 20
How Do You Secure Privileged Users?
CORPORATE NETWORK
PRIVILEGED USER
©2019 LYRA INFOSYSTEMS.ALL RIGHTS RESERVED WORLDWIDE 21
Continuous Cycle of Proactive Cyber Defense
Find security vulnerabilities by building maps and reports of systems
Close the security gaps by repairing poor security,systems and configurations
Automatically discover and change credentials at any scale
Provide secure, controlled access to credentials
©2019 LYRA INFOSYSTEMS.ALL RIGHTS RESERVED WORLDWIDE 22
BeyondTrust Privileged Identity
Discover Privileged Credentials
Continuously identify and document critical IT assets, their privileged accounts &
their interdependencies.
Enforce and Automate Least Privilege
Assign granular access to privileged accounts so that only appropriate personnel can log into
critical systems and infrastructure.
Remediate Inconsistencies
Enforce rules for password complexity, diversity, and change
frequency, and synchronize changes
across all dependencies.
Meet Compliance Mandates
Automatically log access activity to satisfy audit
and compliance requirements, quickly and
effectively.
©2019 LYRA INFOSYSTEMS.ALL RIGHTS RESERVED WORLDWIDE 23
• Super-user login accounts
• Service accounts• Application-to-
application passwords• SSH Keys• Cloud identities
Secure and Manage Passwords for All Privileged Users
Discover, rotate and manage credentials for
©2019 LYRA INFOSYSTEMS.ALL RIGHTS RESERVED WORLDWIDE 24
Bomgar Privileged Access
• Eliminate a cybersecurity threat vector
• Meet privileged access compliance requirements
• Give them a privileged access solution they’ll love
©2019 LYRA INFOSYSTEMS.ALL RIGHTS RESERVED WORLDWIDE 25
Integrate with a wide range of industry-leading Cybersecurity products
Maximize the return of the investments you've already made, and integrate with the process flows you already have in place.
PASSWORDMANAGEMENT
IT SERVICE MANAGEMENT
SIEMTWO FACTOR AUTHENTICATION
ACTIVE DIRECTORY & LDAPS
SAML
Take advantage of pre-built integrations or use the Bomgar API to seamlessly integrate with existing workflows.
©2019 LYRA INFOSYSTEMS.ALL RIGHTS RESERVED WORLDWIDE 26
• Perpetual • Per node
ON-PREMISE• Subscription • Per node
CLOUD
Virtual appliance
Bomgar Secure Cloud
Hardened Physical appliance
Deploy Privileged AccessOn-Site or in the Cloud
©2019 LYRA INFOSYSTEMS.ALL RIGHTS RESERVED WORLDWIDE 27
What can you do with Automated Privileged Identity and Access Management?
• Proactively mitigate cyber threats that bypass traditional enterprise defenses
• Mount an adapative, automated, and rapid cyber defense when under attack
• Manage the life cycle of privileged credentials across the enterprise data center and cloud
• Automates the privileged identity management process at scale
• Protect application logins and record session activity (on-premise, cloud or the web)
• Quickly remediate advanced threats - including pass-the-hash and golden ticket attacks
• Mitigate Auditor Findings and compliance cost and stay compliant within the mandates of PCI DSS, HIPPA, NIST, FISMA etc
• Improve IT Staff Efficiency
©2019 LYRA INFOSYSTEMS.ALL RIGHTS RESERVED WORLDWIDE 28
“With the addition of Bomgar Privileged Access Management, we have a single solution to access all of our customers. No longer have to memorize and rotate every credential manually, Bomgar just takes all of that burden away.”Rick Kramer, Sr. System Engineer – Pink Elephant
Pink Elephant Case StudyTHE CHALLENGE
Specializes in the healthcare industry and has a large customer base in logistics. Manually keeping track of credentials for 120 engineers that serviced many different accounts meant wasted time and security gaps.
THE SOLUTION
Bomgar Privileged Access Management
• Credential management
• Automated password rotation
• Audit trail & able to maintain compliance
THE RESULT
©2019 LYRA INFOSYSTEMS.ALL RIGHTS RESERVED WORLDWIDE 29
“With the addition of Bomgar Privileged Access Management, I can more efficiently manage our vendors and support reps as separate entities, but with consistent technology.”
Scott Pepi, Tech Support Manager
Horizon Beverage Case Study
THE CHALLENGE
Giving third-party vendors access to internal networks.
THE SOLUTION
Bomgar Privileged Access Management
• Vendor Access
• Audit trails
• Increased productivity and more collaboration
THE RESULT
©2019 LYRA INFOSYSTEMS.ALL RIGHTS RESERVED WORLDWIDE 30
Get started with Lyra today! Headquarters - Bangalore
Lyra Infosystems Pvt. LtdPh: +91 80 4040 8181 | +91 80 4146 8078 India North - GurgaonPh: +91 63665 44722
India West - MumbaiPh: +91 22 6608 9618 | +91 22 6608 9553
SingaporePh: +65 6809 7539 | +65 6809 7701
You can always reach our sales rockstars at [email protected] or at [email protected]
©2019 LYRA INFOSYSTEMS.ALL RIGHTS RESERVED WORLDWIDE